SECURITY PROTOCOLS and SERVICES

A. Key Management

1. General

Question 112. How Does One Find Random Numbers for Keys?
Question 113. What is the Life Cycle of a Key?

2. Public-Key Issues

Question 114. What Key Management Issues are Involved in Public-Key Cryptography?
Question 115. Who Needs a Key Pair?
Question 116. How Does One Get a Key Pair?
Question 117. Should a Public Key or Private Key be Shared Among Users?
Question 118. What Happens When a Key Expires?
Question 119. What Happens if I Lose my Private Key?
Question 120. What Happens if my Private Key is Compromised?
Question 121. How Should I Store my Private Key?
Question 122. How Do I Find Someone Else's Public Key?

3. Certificates

Question 123. What are Certificates?
Question 124. How are Certificates Used?
Question 125. Who Issues Certificates and How?
Question 126. How Do Certifying Authorities Store their Private Keys?
Question 127. How Are Certifying Authorities Susceptible to Attack?
Question 128. What if a Certifying Authority's Key is Lost or Compromised?
Question 129. What are Certificate Revocation Lists (CRLs)?

B. Security on the Internet

1. Secure Electronic Mail

Question 130. What is PEM?
Question 131. What is S/MIME?
Question 132. What is PEM-MIME, or What is MOSS?

2. General Security Protocols

Question 133. What is S-HTTP?
Question 134. What is SSL?
Question 135. What is the Difference Between SSL and S-HTTP?
Question 136. What is PCT?
Question 137. What is S/WAN?

3. Electronic Commerce

Question 138. What is Electronic Money?
Question 139. What is iKP?
Question 140. What is SEPP?
Question 141. What is Secure Courier?
Question 142. What is STT?

4. Authentication Systems

Question 143. What are Identification Schemes and Authentication Protocols?
Question 144. What is Kerberos?

C. Cryptography APIs

Question 145. What are CAPIs?